Interactive administration in the cloud: managing the risks NCSC Feed 5 months 1 week ago Tips to help you secure and reduce interactive access to your cloud infrastructure.
Intelligent security tools: are they a smart choice for you? NCSC Feed 5 months 1 week ago What you need to know before buying artificially intelligent security products
Identifying suspicious credential usage NCSC Feed 5 months 1 week ago How NCSC guidance can help organisations detect and protect themselves from credential abuse.
How to talk to board members about cyber NCSC Feed 5 months 1 week ago New guidance helps CISOs communicate with Boards to improve oversight of cyber risk.
How the NCSC thinks about security architecture NCSC Feed 5 months 1 week ago Richard C explains how an understanding of vulnerabilities - and their exploitation - informs how the NCSC assesses the security of computer systems.
How CyberFish's founder got hooked on Cheltenham NCSC Feed 5 months 1 week ago Berta Pappenheim, CEO and co-founder of CyberFish, explains how the NCSC For Startups programme has transformed her professional and personal life.
Helping banish malicious adverts – and drive a secure advertising ecosystem NCSC Feed 5 months 1 week ago If your brand uses digital advertising, the NCSC has new guidance to help you choose a security-minded partner.
Helping organisations - and researchers - to manage vulnerability disclosure NCSC Feed 5 months 1 week ago Ollie N explains the thinking behind the NCSC’s new Vulnerability Disclosure Toolkit, which is now available to download.
Growing positive security cultures NCSC Feed 5 months 1 week ago If your security culture isn't improving naturally, here's what you can do about it.
Funded cyber certification helps small charities to provide legal aid to vulnerable citizens NCSC Feed 5 months 1 week ago How the funded Cyber Essentials Programme helped the ‘Law Centres Network’ protect its IT estate - and client data - from cyber attacks.
From the cyber proliferation threat all the way to Pall Mall NCSC Feed 5 months 1 week ago The first dedicated conference on this topic – and an insight into the NCSC assessment work behind it.
Exercise caution when building off LLMs NCSC Feed 5 months 1 week ago Large Language Models are an exciting technology, but our understanding of them is still 'in beta'.
Erasing data from donated devices NCSC Feed 5 months 1 week ago How charities can erase personal data from donated laptops, phones and tablets, before passing them on.
Eradicating trivial vulnerabilities, at scale NCSC Feed 5 months 1 week ago A new NCSC research paper aims to reduce the presence of ‘unforgivable’ vulnerabilities.
Equities process NCSC Feed 5 months 1 week ago Publication of the UK’s process for how we handle vulnerabilities.
Early Warning is joining MyNCSC NCSC Feed 5 months 1 week ago Early Warning, one of the NCSC’s flagship ACD services, will be soon be migrated to the MyNCSC platform. Here we explain the background and what users can expect.
Drawing good architecture diagrams NCSC Feed 5 months 1 week ago Some tips on good diagram drafting and pitfalls to avoid when trying to understand a system in order to secure it.
Digital twins: secure design and development NCSC Feed 5 months 1 week ago How existing NCSC guidance can assist those looking to develop and deploy ‘digital twins’.
Defending software build pipelines from malicious attack NCSC Feed 5 months 1 week ago Compromise of your software build pipeline can have wide-reaching impact; here's how to tackle the problem.
Data-driven cyber: empowering government security with focused insights from data NCSC Feed 5 months 1 week ago How 'small but actionable' insights can improve behaviours and decision making.